CMGTCB 554 IT Infrastructure International Plastics Inc Network Diagrams

docx

School

University of Phoenix *

*We aren’t endorsed by this school

Course

CMGTCB554

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

10

Uploaded by GeneralCrownTiger25

Report
1 International Plastics Inc. Network Diagram Analysis Competency 2 - Assessment University of Phoenix IT Infrastructure/CMGTCB 554 Ongart (peng) Ratchaworapong 5/26/2023 Grade: MA
2 International Plastics Inc. Network Diagram Analysis International Plastics Inc.’s IT infrastructure uses outdated technology. An analysis and assessment of the infrastructure has been conducted for improvement recommendations. The improvements can help expand performance and help improve business growth. Network Diagram Analysis International Plastics Inc. has four locations, Corporate Headquarters in San Jose with four business units and R&D, China Headquarters with the same business units and R&D. Both locations have identical IT infrastructure. The remaining two locations are manufacturing plants containing administrative offices and manufacturing floors. The improvements will help eliminate data silos and each business unit can have a holistic view for digital transformation and standardization to gain better business insights and streamline processes. Corporate Headquarters The IT infrastructure improvement recommendations are to upgrade the network bandwidth for 100base T to 1 GB and have dedicated bandwidth for VoIP. The dedicated bandwidth for VoIP is for quality of service (QoS) to prevent packet loss and improve call quality. Enhance the network security and optimize performance with 1 Gbps network speed by implementing Cisco's next-generation firewalls. These advanced security measures and upgraded infrastructure provide a secure foundation to operate on, safeguarding sensitive data from constantly evolving cyber threats. With these reliable and cutting-edge tools, the business can stay ahead of the curve and maintain a competitive edge to help to stay protected and secure. Implementing IP subnet addressing is highly recommended to optimize the utilization of IP addresses. This network configuration allows for improved network performance by dividing a larger network into smaller, more manageable subnets. Furthermore, IP subnet addressing
3 enhances network security by limiting broadcast traffic and preventing unauthorized access to private IP addresses. Additionally, this approach facilitates the integration of wireless and mobile devices, providing users with a more seamless and efficient experience. Utilizing IP subnet addressing can increase their IP address efficiency and effectively manage their network resources. In order to facilitate the use of essential business systems via mobile devices, the recommendation is to install wireless access points (WAPs) throughout the Corporate Headquarters and R&D departments. By implementing WAP, employees can easily and securely access resources throughout the building, allowing them to work efficiently and effectively with added flexibility. Upgrade the end-user desktops that can leverage the faster network speed. The devices will have the latest operating system to ensure the devices can receive security patches. The devices will have faster processing speeds, more RAM, and larger solid-state drive that will support newer technologies. The last recommendation is to move the IT infrastructure to a cloud-based platform. Using Amazon Web Services (AWS) virtual private network (VPN) and AWS Connect to securely connect to applications and services hosted in the cloud. The storage server and two onsite Windows servers are moved to AWS instances that support Corporate Headquarters business units and R&D. The AWS server instances will improve performance and reduce maintenance costs. The servers are also scalable, flexible, and secure. Modernizing the Exchange server to cloud-based will reduce maintenance costs on existing on-premises server and ensure the application is secure with the latest security patches. Moving to cloud-based Exchange will
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 include O365 Office applications that can be deployed to all computers company-wide. Users will also have access to web-based versions of O365 applications while working off-site. Migrate the on-premises SAP to cloud-based SAP S/4 HANA. Users in all four locations can access the application and eliminate the need to transfer data back to Corporate Headquarters. It will provide ERP data for business units in real-time to increase productivity and decision-making. China Headquarters China Headquarters’ IT infrastructure is similar to Corporate Headquarters. The China location recommendation is to also upgrade the network speed from 100base T to 1 GB and also dedicated network bandwidth QoS for VoIP to improve call quality. The China Headquarters will also implement IP address subnets to separate the network through access controls to prevent unauthorized access to sensitive data. Additionally, upgrading the firewall to Cisco Next- Generation Firewall (NGFW) to help optimize network performance and intrusion protection system for data protection. The recommendation is to install wireless access points (WAPs) in the facility and the R&D department to enhance workplace flexibility and mobility. These WAPs will enable the use of personal or mobile devices, granting greater flexibility and convenience for work. By strategically installing WAPs throughout the facility, employees can seamlessly utilize their personal or mobile devices to stay productive, regardless of where they are in the building. Likewise, WAPs in the R&D department can provide researchers with continuous access to important data, enabling them to work efficiently and effectively. Upgrade the end-user desktops that can leverage faster network speeds. The devices will have the latest operating system to ensure the devices can receive security patches. The devices
5 will have faster processing speeds, more RAM, and larger solid-state drive that will support newer technologies. O365 Microsoft and desktop and web applications will be available to users. The location will also use a cloud-based platform to move on-premises servers. The configuration will consist of AWS VPN, AWS Connect, two Windows servers to support China Headquarters administrative offices and R&D, and AWS storage. The location will be able to access SAP S/4 HANA ERP and Exchange. Albany, GA and Pontiac, MI Locations The two manufacturing locations have similar IT infrastructure, with the exception of the number of employees. Each location would upgrade the network from 100base T to 1 GB and upgrade cabling to CAT 5e to leverage newer technologies. Each manufacturing floor will be equipped with wireless access points (WAP) to enable staff to use mobile devices to access network resources, such as supply chain management, to increase business performance. To ensure optimal network protection and minimize the risk of unauthorized access to confidential information, it is recommended that both locations opt for implementing Cisco Next-Generation Firewall (NGFW) technology in conjunction with utilizing IP address subnets. This measure will provide an added layer of security that can help safeguard your network from potential threats and ensure that your data remains secure at all times. AWS VPN, AWS Connect and AWS EC2 server instances, will remove the on-premises servers and have access to the AWS Storage. Also, upgrade the end-user desktops that can leverage faster network speed. The devices will have the latest operating system to ensure the devices can receive security patches. The devices will have faster processing speeds, more RAM, and larger solid-state drive that will support newer technologies.
6 Risk Assessment and Mitigation Plan for IT Infrastructure Improvements The proposed IT infrastructure improvements aim to enhance the systems' overall performance, security, and functionality. Assessing and mitigating potential risks when implementing changes is vital to ensure a successful transition. This risk assessment and mitigation plan will identify possible risks associated with each recommendation and suggest strategies to minimize their impact. Upgrading Hardware and Software Risk: Downtime can disrupt productivity levels and may have a financial impact when undergoing an upgrade. It is crucial to avoid downtime as much as possible during the upgrade process to maintain efficiency and meet business objectives. Mitigation Strategy: To minimize downtime, upgrading the infrastructure in stages is best. It's advisable to schedule upgrades during non-peak hours or weekends when system usage is low. It's important to communicate the upgrade schedule to users well in advance to ensure they have enough time to plan accordingly. Implementing New Security Measures Risk: It is critical to ensure that new security protocols are implemented correctly to prevent any potential breaches. In addition, it is essential to provide ongoing training and security awareness campaigns to employees to ensure they are aware and knowledgeable about identifying and avoiding any security threats. Failing to do so could result in severe consequences, including compromised data and sensitive information, which could harm the business and its stakeholders. Mitigation Strategy: To ensure the security of the business, it is important to hire experienced professionals who can implement proper security measures if the existing staff
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
7 needs to be more skilled in the type of implementation. Additionally, comprehensive training should be provided for all employees on new security protocols. Finally, periodic security audits should be conducted to identify and address potential vulnerabilities. Data Migration to Cloud Storage Risk: When undergoing the migration process, it is crucial to remain aware of the potential risks that may arise. These risks can include the loss of valuable data, security breaches that may compromise cloud storage, and the possibility of experiencing downtime, which may negatively impact productivity and overall business operations. By remaining aware and taking the necessary precautions, minimizing the negative impacts of these risks and successfully navigating the migration process is possible. Mitigation Strategy: To prevent losing data, it is important to perform regular backups before, during, and after migration. Selecting a trustworthy cloud storage provider, such as AWS, with strong security measures is also recommended. To minimize downtime, the migration can occur during off-peak hours. Network Redesign and Expansion Risk: During the redesign process, network downtime may cause security vulnerabilities in the new network configuration. It is crucial to consider the financial impact of expanding. Mitigation Strategy: To minimize downtime, it is recommended to redesign the network in phases. Before implementation, it is vital to test the new network configuration thoroughly. Budgeting appropriately for expansion costs and exploring cost-effective solutions to optimize resources is also important.
8 Integrating New Technologies and Tools Risk: Adopting new technologies can be met with employee resistance, potential compatibility issues with existing systems, and a loss of productivity during the learning curve. Mitigation Strategy: It is imperative to offer comprehensive training to all employees when introducing new technologies and tools in the workplace. To ensure seamless operation, selecting solutions compatible with current systems or creating an integration plan is essential. Additionally, providing ongoing support and resources is crucial to assist employees in adapting to the changes and to guarantee a successful transition. By taking these necessary steps, the business can minimize disruption and ensure employees have the knowledge and tools to carry out their roles effectively. By carefully considering the potential risks and their likelihood and severity, we can develop effective strategies to minimize their impact. Implementing these mitigating strategies will ensure a successful transition to the improved IT infrastructure, ultimately enhancing the systems' overall performance, security, and functionality. Conclusion International Plastics Inc. is faced with outdated technology that puts the business at risk of cyber-attacks of stealing sensitive data. It is important to secure and protect that data by updating the IT infrastructure and streamline business processes and performance. It is essential the recommendations are considered to stay competitive. By carefully considering the potential risks and their likelihood and severity, developing effective strategies can help minimize their impact. Implementing these mitigating strategies will help ensure a successful transition to the improved IT infrastructure, ultimately enhancing the systems' overall performance, security, and functionality.
9 References Amazon Web Services. (2023). AWS VPN CloudHub . Retrieved from https://docs.aws.amazon.com/whitepapers/latest/aws-vpc-connectivity-options/aws-vpn- cloudhub.html Amazon Web Services. (2023). What is AWS Direct Connect? Retrieved from AWS: https://docs.aws.amazon.com/directconnect/latest/UserGuide/Welcome.html Cisco Systems, Inc. (2023). Compare Industry Next-Generation Firewalls (NGFWs) . Retrieved from Cisco.com: https://www.cisco.com/c/m/en_hk/products/security/firewalls/competitive- comparison.html Cisco Systems, Inc. (2023, 02 13). Configure IP Addresses and Unique Subnets for New Users . Retrieved from Cisco.com: https://www.cisco.com/c/en/us/support/docs/ip/routing- information-protocol-rip/13788-3.html#anc5 Irel, A. a. (2022, 12). Wireless security: WEP, WPA, WPA2 and WPA3 differences . Retrieved from TechTarget.com: https://www.techtarget.com/searchnetworking/feature/Wireless- encryption-basics-Understanding-WEP-WPA-and-WPA2 Microsoft. (2023). Find Windows 11 specs, features, and computer requirements . Retrieved from Microsoft.com: https://www.microsoft.com/en-us/windows/windows-11-specifications? r=1 Scale Computing. (2022, 12 14). IT Infrastructure Risk Management . Retrieved from ScaleComputing.com: https://www.scalecomputing.com/resources/it-infrastructure-risk- management
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
10